SW Name |
Home page |
Downloaded |
srm |
http://srm.sourceforge.net/ |
3902x |
Srm (secure rm) is a command-line compatible rm(1) which destroys file contents before unlinking.
|
|
spamresponder |
http://www.thinknerd.org/[..]pamresponder/ |
3899x |
Spamresponder is a very simple and radical spam filter.
|
|
MIME Defanger |
http://www.mimedefang.org/ |
3891x |
MIME Defanger is a flexible MIME e-mail scanner designed to protect Windows clients from viruses. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unnaceptable attachments. MIME Defanger works with Sendmail 8.10's new "Milter" API, which gives it much more flexibility than procmail-based approaches.
|
|
clamfilter |
http://www.ensita.net/[..]s/clamfilter/ |
3840x |
Clamfilter is a small, secure, and very efficient content filter for Postfix designed for filtering messages efficiently through the clamd daemon.
|
|
Grsec |
http://grsec.linux-kernel.at/index.php |
3836x |
Kernel 2.4.x and 2.6.x patch to enhance security of Linux system.
|
|
spamhammerd |
http://n0rp.chemlab.org/spamhammer/ |
3810x |
Spamhammerd is a dynamic blacklist daemon for Postfix. It watches for clients generating excessive errors, and adds them to the blacklist after a configurable threshold. It is extremely effective on large SMTP clusters.
|
|
SpamBouncer |
http://www.spambouncer.org/ |
3778x |
The SpamBouncer is a set of procmail recipes, or instructions, which search the headers and text of your incoming email to see if it meets one or more of the predefined conditions. The SpamBouncer sorts suspected spam into three categories -- email sent by a virus, email from known spam sources which is definitely spam, and email which is probably spam, but might also be legitimate. It then tags each email with appropriate headers for the spam classification, and responds according to the parameters you have set.
|
|
FieryFilter |
http://www.stud.uni-hamburg.de/[..]/fieryfilter/ |
3750x |
FieryFilter is an interactive desktop firewall for Linux. It will ask the user every time a new network connection is made if they want to allow or deny it. The user is able to generate rules from connections and thus minimize the amount of questions asked.
|
|
BestCrypt |
http://www.jetico.com/linux.html |
3692x |
A BestCrypt volume is accessible as a regular filesystem on a correspondent mount point. The data stored on a BestCrypt volume is stored in the container file. A container is a regular file or block device, so it is possible to backup, move, or copy it to other disk (CD-ROM or network, for instance) and continue to access encrypted data using BestCrypt. BestCrypt supports the following encryption algorithms: GOST in Cipher Feedback mode and BLOWFISH, DES, TWOFISH in Cipher Block Chaining mode. A container can be formatted for any filesystem supported by Linux (MINIX, EXT, EXT2, FAT, FAT32, and others) and mounted as an additional volume to any mount point.
|
|
CodeSeeker |
http://freshmeat.net/[..]s/codeseeker/ |
3681x |
CodeSeeker is an application level firewall and intrusion detection system that is not a packet proxy, but rather a plugin to the TCP stack itself.
|
|
Cyan Secure Web |
http://www.cyan-networks.com/ |
3668x |
Cyan Secure Web Proxy Server is a carrier grade, high performance filtering proxy server for Linux. It includes scalable (user/group/host) Web filter and virus scan utilities for blocking malicious applications at the gateway. It has an advanced URL database, authentication support (LDAP and Active Directory), easy deployment, and remote administration.
|
|
GEXEC |
http://www.theether.org/gexec/ |
3638x |
GEXEC is a scalable cluster remote execution system which provides fast, RSA authenticated remote execution of parallel and distributed jobs
|
|
levy |
http://muse.linuxmafia.org/levy/ |
3614x |
levy is a perl script which generates a basic iptables ruleset based.
|
|
conspy |
http://adsl-brisbane.lubemobile.com.au/ras/conspy/ |
3540x |
Conspy allows a (possibly remote) user to see what is displayed on a Linux virtual console, and send keystrokes to it.
|
|
ipfwadm2ipchains |
http://www.stearns.org/[..]adm2ipchains/ |
3495x |
ipfwadm2ipchains is a script designed to convert ipfwadm rulesets into ipchains rulesets.
|
|